Font Size: a A A

Research On Key Technologies Of End Hopping And Spreading File Transfer

Posted on:2020-12-20Degree:MasterType:Thesis
Country:ChinaCandidate:H B GuoFull Text:PDF
GTID:2518306500486984Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of computer technology,computer networks are spread all over the industry in people's daily lives.But the problems of network security are becoming more and more serious.Active network defense technology plays a vital role as the current popular defense technology.End Hopping and Spreading technology that is a part of the active network defense technology has received more and more attention.The End Hopping and Spreading technology that changes the end information dynamically in the end-to-end data transmission is an active defense technology for separating the hopping strategy and the synchronization strategy to realize the high-speed hopping.File transfer as a way of sharing data between users has a wide range of applications in life.In order to prevent the leakage of file content,the traditional way is to encrypt the file content.The file is encrypted by the public key to ensure data security.Based on the research of End Hopping and Spreading network defense,the paper proposes End Hopping and Spreading file transfer method and studies its key strategies in order to implement covert transmission of files.In this paper,the multicast synchronization time correction scheme is adopted to realize the time correction between clients through mutual communication between clients,which reduces the time error and solves the synchronization problem in the communication process thanks to the time offset;The data migration is added into End Hopping and Spreading system model to realize the covert transmission and integrity transmission of files;This paper proposes two hopping strategies which can transmit file data better and safer and ensure the high concealment of data transmission.Firstly,this paper introduces the theory of End Hopping,cluster scheduling,file transfer technology and network socket programming.At the same time,it analyzes the research status of active network defense at home and abroad.After that,the paper designs a file transfer model of End Hopping and Spreading,describes the key technologies in the model in detail and conducts feasibility analysis.Finally,the thesis analyzes the function and performance of the model's usability and security and verifies it by experiment.The results show that the End Hopping and Spreading file transfer strategy can effectively realize the integrity transmission of files and the covert communication of data.
Keywords/Search Tags:Active Network Defense, End hopping and Spreading, File Transfer, Time Correction, Data Migration, Covert Communication
PDF Full Text Request
Related items